ELSA-2018-0816 - qemu-kvm security, bug fix, and enhancement update
Type: | SECURITY |
Severity: | LOW |
Release Date: | 2018-04-16 |
Description
[1.5.3-156.el7]
- kvm-vnc-Fix-qemu-crashed-when-vnc-client-disconnect-sudd.patch [bz#1527405]
- kvm-fix-full-frame-updates-for-VNC-clients.patch [bz#1527405]
- kvm-vnc-update-fix.patch [bz#1527405]
- kvm-vnc-return-directly-if-no-vnc-client-connected.patch [bz#1527405]
- kvm-buffer-add-buffer_move_empty.patch [bz#1527405]
- kvm-buffer-add-buffer_move.patch [bz#1527405]
- kvm-vnc-kill-jobs-queue-buffer.patch [bz#1527405]
- kvm-vnc-jobs-move-buffer-reset-use-new-buffer-move.patch [bz#1527405]
- kvm-vnc-zap-dead-code.patch [bz#1527405]
- kvm-vnc-add-vnc_width-vnc_height-helpers.patch [bz#1527405]
- kvm-vnc-factor-out-vnc_update_server_surface.patch [bz#1527405]
- kvm-vnc-use-vnc_-width-height-in-vnc_set_area_dirty.patch [bz#1527405]
- kvm-vnc-only-alloc-server-surface-with-clients-connected.patch [bz#1527405]
- kvm-ui-fix-refresh-of-VNC-server-surface.patch [bz#1527405]
- kvm-ui-move-disconnecting-check-to-start-of-vnc_update_c.patch [bz#1527405]
- kvm-ui-remove-redundant-indentation-in-vnc_client_update.patch [bz#1527405]
- kvm-ui-avoid-pointless-VNC-updates-if-framebuffer-isn-t-.patch [bz#1527405]
- kvm-ui-track-how-much-decoded-data-we-consumed-when-doin.patch [bz#1527405]
- kvm-ui-introduce-enum-to-track-VNC-client-framebuffer-up.patch [bz#1527405]
- kvm-ui-correctly-reset-framebuffer-update-state-after-pr.patch [bz#1527405]
- kvm-ui-refactor-code-for-determining-if-an-update-should.patch [bz#1527405]
- kvm-ui-fix-VNC-client-throttling-when-audio-capture-is-a.patch [bz#1527405]
- kvm-ui-fix-VNC-client-throttling-when-forced-update-is-r.patch [bz#1527405]
- kvm-ui-place-a-hard-cap-on-VNC-server-output-buffer-size.patch [bz#1527405]
- kvm-ui-avoid-sign-extension-using-client-width-height.patch [bz#1527405]
- kvm-ui-correctly-advance-output-buffer-when-writing-SASL.patch [bz#1527405]
- kvm-io-skip-updates-to-client-if-websocket-output-buffer.patch [bz#1518711]
- Resolves: bz#1518711
(CVE-2017-15268 qemu-kvm: Qemu: I/O: potential memory exhaustion via websock connection to VNC [rhel-7.5])
- Resolves: bz#1527405
(CVE-2017-15124 qemu-kvm: Qemu: memory exhaustion through framebuffer update request message in VNC server [rhel-7.5])
[1.5.3-155.el7]
- kvm-qdev-Fix-assert-in-PCI-address-property-when-used-by.patch [bz#1538866]
- kvm-vga-check-the-validation-of-memory-addr-when-draw-te.patch [bz#1534691]
- kvm-savevm-Improve-error-message-for-blocked-migration.patch [bz#1536883]
- kvm-savevm-fail-if-migration-blockers-are-present.patch [bz#1536883]
- Resolves: bz#1534691
(CVE-2018-5683 qemu-kvm: Qemu: Out-of-bounds read in vga_draw_text routine [rhel-7.5])
- Resolves: bz#1536883
([abrt] [faf] qemu-kvm: unknown function(): /usr/libexec/qemu-kvm killed by 6)
- Resolves: bz#1538866
(qemu will coredump after executing info qtree)
[1.5.3-154.el7]
- kvm-virtio-net-validate-backend-queue-numbers-against-bu.patch [bz#1460872]
- kvm-dump-guest-memory.py-fix-python-2-support.patch [bz#1411490]
- kvm-qxl-add-migration-blocker-to-avoid-pre-save-assert.patch [bz#1536883]
- Resolves: bz#1411490
([RFE] Kernel address space layout randomization [KASLR] support (qemu-kvm))
- Resolves: bz#1460872
(Aborted(core dumped) when booting guest with '-netdev tap....vhost=on,queues=32')
- Resolves: bz#1536883
([abrt] [faf] qemu-kvm: unknown function(): /usr/libexec/qemu-kvm killed by 6)
[1.5.3-153.el7]
- kvm-i386-update-ssdt-misc.hex.generated.patch [bz#1411490]
- kvm-main-loop-Acquire-main_context-lock-around-os_host_m.patch [bz#1435432 bz#1473536]
- Resolves: bz#1411490
([RFE] Kernel address space layout randomization [KASLR] support (qemu-kvm))
- Resolves: bz#1435432
(Emulated ISA serial port hangs randomly when sending lots of data from guest -> host)
- Resolves: bz#1473536
(Hangs in serial console under qemu)
[1.5.3-152.el7]
- kvm-target-i386-cpu-add-new-CPUID-bits-for-indirect-bran.patch [CVE-2017-5715]
- kvm-target-i386-add-support-for-SPEC_CTRL-MSR.patch [CVE-2017-5715]
- kvm-target-i386-cpu-add-new-CPU-models-for-indirect-bran.patch [CVE-2017-5715]
[1.5.3-151.el7]
- kvm-fw_cfg-remove-support-for-guest-side-data-writes.patch [bz#1411490]
- kvm-fw_cfg-prevent-selector-key-conflict.patch [bz#1411490]
- kvm-fw_cfg-prohibit-insertion-of-duplicate-fw_cfg-file-n.patch [bz#1411490]
- kvm-fw_cfg-factor-out-initialization-of-FW_CFG_ID-rev.-n.patch [bz#1411490]
- kvm-Implement-fw_cfg-DMA-interface.patch [bz#1411490]
- kvm-fw_cfg-avoid-calculating-invalid-current-entry-point.patch [bz#1411490]
- kvm-fw-cfg-support-writeable-blobs.patch [bz#1411490]
- kvm-Enable-fw_cfg-DMA-interface-for-x86.patch [bz#1411490]
- kvm-fw_cfg-unbreak-migration-compatibility.patch [bz#1411490]
- kvm-i386-expose-fw_cfg-QEMU0002-in-SSDT.patch [bz#1411490]
- kvm-fw_cfg-add-write-callback.patch [bz#1411490]
- kvm-hw-misc-add-vmcoreinfo-device.patch [bz#1411490]
- kvm-vmcoreinfo-put-it-in-the-misc-device-category.patch [bz#1411490]
- kvm-fw_cfg-enable-DMA-if-device-vmcoreinfo.patch [bz#1411490]
- kvm-build-sys-restrict-vmcoreinfo-to-fw_cfg-dma-capable-.patch [bz#1411490]
- kvm-dump-Make-DumpState-and-endian-conversion-routines-a.patch [bz#1411490]
- kvm-dump.c-Fix-memory-leak-issue-in-cleanup-processing-f.patch [bz#1411490]
- kvm-dump-Propagate-errors-into-qmp_dump_guest_memory.patch [bz#1411490]
- kvm-dump-Turn-some-functions-to-void-to-make-code-cleane.patch [bz#1411490]
- kvm-dump-Fix-dump-guest-memory-termination-and-use-after.patch [bz#1411490]
- kvm-dump-allow-target-to-set-the-page-size.patch [bz#1411490]
- kvm-dump-allow-target-to-set-the-physical-base.patch [bz#1411490]
- kvm-dump-guest-memory-cleanup-removing-dump_-error-clean.patch [bz#1411490]
- kvm-dump-guest-memory-using-static-DumpState-add-DumpSta.patch [bz#1411490]
- kvm-dump-guest-memory-add-dump_in_progress-helper-functi.patch [bz#1411490]
- kvm-dump-guest-memory-introduce-dump_process-helper-func.patch [bz#1411490]
- kvm-dump-guest-memory-disable-dump-when-in-INMIGRATE-sta.patch [bz#1411490]
- kvm-DumpState-adding-total_size-and-written_size-fields.patch [bz#1411490]
- kvm-dump-do-not-dump-non-existent-guest-memory.patch [bz#1411490]
- kvm-dump-add-guest-ELF-note.patch [bz#1411490]
- kvm-dump-update-phys_base-header-field-based-on-VMCOREIN.patch [bz#1411490]
- kvm-kdump-set-vmcoreinfo-location.patch [bz#1411490]
- kvm-scripts-dump-guest-memory.py-Move-constants-to-the-t.patch [bz#1411490]
- kvm-scripts-dump-guest-memory.py-Make-methods-functions.patch [bz#1411490]
- kvm-scripts-dump-guest-memory.py-Improve-python-3-compat.patch [bz#1411490]
- kvm-scripts-dump-guest-memory.py-Cleanup-functions.patch [bz#1411490]
- kvm-scripts-dump-guest-memory.py-Introduce-multi-arch-su.patch [bz#1411490]
- kvm-Fix-typo-in-variable-name-found-and-fixed-by-codespe.patch [bz#1411490]
- kvm-scripts-dump-guest-memory.py-add-vmcoreinfo.patch [bz#1411490]
- kvm-dump-guest-memory.py-fix-No-symbol-vmcoreinfo_find.patch [bz#1411490]
- kvm-dump-guest-memory.py-fix-You-can-t-do-that-without-a.patch [bz#1411490]
- Resolves: bz#1411490
([RFE] Kernel address space layout randomization [KASLR] support (qemu-kvm))
[1.5.3-150.el7]
- kvm-Build-only-x86_64-packages.patch [bz#1520793]
- Resolves: bz#1520793
(Do not build non-x86_64 subpackages)
[1.5.3-149.el7]
- kvm-block-linux-aio-fix-memory-and-fd-leak.patch [bz#1491434]
- kvm-linux-aio-Fix-laio-resource-leak.patch [bz#1491434]
- kvm-slirp-cleanup-leftovers-from-misc.h.patch [bz#1508745]
- kvm-Avoid-embedding-struct-mbuf-in-other-structures.patch [bz#1508745]
- kvm-slirp-Fix-access-to-freed-memory.patch [bz#1508745]
- kvm-slirp-fix-clearing-ifq_so-from-pending-packets.patch [bz#1508745]
- kvm-qcow2-Prevent-backing-file-names-longer-than-1023.patch [bz#1459714]
- kvm-qemu-img-Use-strerror-for-generic-resize-error.patch [bz#1459725]
- kvm-qcow2-Avoid-making-the-L1-table-too-big.patch [bz#1459725]
- Resolves: bz#1459714
(Throw error if qemu-img rebasing backing file is too long or provide way to fix a 'too long' backing file.)
- Resolves: bz#1459725
(Prevent qemu-img resize from causing 'Active L1 table too large')
- Resolves: bz#1491434
(KVM leaks file descriptors when attaching and detaching virtio-scsi block devices)
- Resolves: bz#1508745
(CVE-2017-13711 qemu-kvm: Qemu: Slirp: use-after-free when sending response [rhel-7.5])
[1.5.3-148.el7]
- kvm-multiboot-validate-multiboot-header-address-values.patch [bz#1501121]
- kvm-qemu-option-reject-empty-number-value.patch [bz#1417864]
- Resolves: bz#1417864
(Qemu-kvm starts with unspecified port)
- Resolves: bz#1501121
(CVE-2017-14167 qemu-kvm: Qemu: i386: multiboot OOB access while loading kernel image [rhel-7.5])
[1.5.3-147.el7]
- kvm-vga-drop-line_offset-variable.patch [bz#1501295]
- kvm-vga-Add-mechanism-to-force-the-use-of-a-shadow-surfa.patch [bz#1501295]
- kvm-vga-handle-cirrus-vbe-mode-wraparounds.patch [bz#1501295]
- kvm-cirrus-fix-oob-access-in-mode4and5-write-functions.patch [bz#1501295]
- kvm-i6300esb-Fix-signed-integer-overflow.patch [bz#1470244]
- kvm-i6300esb-fix-timer-overflow.patch [bz#1470244]
- kvm-i6300esb-remove-muldiv64.patch [bz#1470244]
- Resolves: bz#1470244
(reboot leads to shutoff of qemu-kvm-vm if i6300esb-watchdog set to poweroff)
- Resolves: bz#1501295
(CVE-2017-15289 qemu-kvm: Qemu: cirrus: OOB access issue in mode4and5 write functions [rhel-7.5])
[1.5.3-146.el7]
- kvm-vfio-pass-device-to-vfio_mmap_bar-and-use-it-to-set-.patch [bz#1494181]
- kvm-hw-vfio-pci-Rename-VFIODevice-into-VFIOPCIDevice.patch [bz#1494181]
- kvm-hw-vfio-pci-generalize-mask-unmask-to-any-IRQ-index.patch [bz#1494181]
- kvm-hw-vfio-pci-introduce-minimalist-VFIODevice-with-fd.patch [bz#1494181]
- kvm-hw-vfio-pci-add-type-name-and-group-fields-in-VFIODe.patch [bz#1494181]
- kvm-hw-vfio-pci-handle-reset-at-VFIODevice.patch [bz#1494181]
- kvm-hw-vfio-pci-Introduce-VFIORegion.patch [bz#1494181]
- kvm-hw-vfio-pci-use-name-field-in-format-strings.patch [bz#1494181]
- kvm-vfio-Add-sysfsdev-property-for-pci-platform.patch [bz#1494181]
- kvm-vfio-remove-bootindex-property-from-qdev-to-qom.patch [bz#1494181]
- kvm-vfio-pci-Handle-host-oversight.patch [bz#1494181]
- kvm-vfio-pci-Fix-incorrect-error-message.patch [bz#1494181]
- kvm-vfio-Wrap-VFIO_DEVICE_GET_REGION_INFO.patch [bz#1494181]
- kvm-vfio-Generalize-region-support.patch [bz#1494181]
- kvm-vfio-Enable-sparse-mmap-capability.patch [bz#1494181]
- kvm-vfio-Handle-zero-length-sparse-mmap-ranges.patch [bz#1494181]
- kvm-bswap.h-Remove-cpu_to_32wu.patch [bz#1486642]
- kvm-hw-use-ld_p-st_p-instead-of-ld_raw-st_raw.patch [bz#1486642]
- kvm-vga-Start-cutting-out-non-32bpp-conversion-support.patch [bz#1486642]
- kvm-vga-Remove-remainder-of-old-conversion-cruft.patch [bz#1486642]
- kvm-vga-Separate-LE-and-BE-conversion-functions.patch [bz#1486642]
- kvm-vga-Rename-vga_template.h-to-vga-helpers.h.patch [bz#1486642]
- kvm-vga-stop-passing-pointers-to-vga_draw_line-functions.patch [bz#1486642]
- kvm-target-i386-Add-Intel-SHA_NI-instruction-support.patch [bz#1450396]
- kvm-target-i386-cpu-Add-new-EPYC-CPU-model.patch [bz#1450396]
- kvm-target-i386-Enable-clflushopt-clwb-pcommit-instructi.patch [bz#1501510]
- kvm-i386-add-Skylake-Server-cpu-model.patch [bz#1501510]
- Resolves: bz#1450396
(Add support for AMD EPYC processors)
- Resolves: bz#1486642
(CVE-2017-13672 qemu-kvm: Qemu: vga: OOB read access during display update [rhel-7.5])
- Resolves: bz#1494181
(Backport vGPU support to qemu-kvm)
- Resolves: bz#1501510
(Add Skylake-Server CPU model (qemu-kvm))
[1.5.3-145.el7]
- kvm-qemu-char-add-Czech-characters-to-VNC-keysyms.patch [bz#1476641]
- kvm-qemu-char-add-missing-characters-used-in-keymaps.patch [bz#1476641]
- kvm-qemu-char-add-cyrillic-characters-numerosign-to-VNC-.patch [bz#1476641]
- kvm-block-ssh-Use-QemuOpts-for-runtime-options.patch [bz#1461672]
- Resolves: bz#1461672
(qemu-img core dumped when create external snapshot through ssh protocol without specifying image size)
- Resolves: bz#1476641
(ui/vnc_keysym.h is very out of date and does not correctly support many Eastern European keyboards)
[1.5.3-144.el7]
- kvm-qemu-nbd-Ignore-SIGPIPE.patch [bz#1466463]
- Resolves: bz#1466463
(CVE-2017-10664 qemu-kvm: Qemu: qemu-nbd: server breaks with SIGPIPE upon client abort [rhel-7.5])
[1.5.3-143.el7]
- kvm-block-Limit-multiwrite-merge-downstream-only.patch [bz#1492559]
- Resolves: bz#1492559
(virtio-blk mutiwrite merge causes too big IO)
[1.5.3-142.el7]
- kvm-vnc-allow-to-connect-with-add_client-when-vnc-none.patch [bz#1435352]
- kvm-virtio-net-dynamic-network-offloads-configuration.patch [bz#1480428]
- kvm-Workaround-rhel6-ctrl_guest_offloads-machine-type-mi.patch [bz#1480428]
- kvm-target-i386-Add-PKU-and-and-OSPKE-support.patch [bz#1387648]
- Resolves: bz#1387648
([Intel 7.5 FEAT] Memory Protection Keys for qemu-kvm)
- Resolves: bz#1435352
(qemu started with '-vnc none,...' doesn't support any VNC authentication)
- Resolves: bz#1480428
(KVM: windows guest migration from EL6 to EL7 fails.)
Related CVEs
Updated Packages
Release/Architecture | Filename | MD5sum | Superseded By Advisory |
|
Oracle Linux 7 (x86_64) | qemu-kvm-1.5.3-156.el7.src.rpm | cc3034949bf287dc54dd0743e9e8c82d | ELBA-2021-9161 |
| qemu-img-1.5.3-156.el7.x86_64.rpm | d2212bc4ad09dd4365af45c24e664c0c | ELBA-2021-9161 |
| qemu-kvm-1.5.3-156.el7.x86_64.rpm | 5627c840302cd7938a650fd1fb90561f | ELBA-2021-9161 |
| qemu-kvm-common-1.5.3-156.el7.x86_64.rpm | a8a68b1b157cdbec82b7acb6050f9be0 | ELSA-2021-0347 |
| qemu-kvm-tools-1.5.3-156.el7.x86_64.rpm | fa2f7628a5f089f59b9abf8a70451699 | ELSA-2021-0347 |
This page is generated automatically and has not been checked for errors or omissions. For clarification
or corrections please contact the Oracle Linux ULN team